Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Security and Privacy Issues in Wireless Networks and Mitigation Methods

Version 1 : Received: 4 September 2020 / Approved: 5 September 2020 / Online: 5 September 2020 (03:59:03 CEST)

How to cite: Ahmad Kamal, A.H.; Yi Yen, C.C.; Ling, P.S.; -tuz-Zahra, F. Security and Privacy Issues in Wireless Networks and Mitigation Methods. Preprints 2020, 2020090110 (doi: 10.20944/preprints202009.0110.v1). Ahmad Kamal, A.H.; Yi Yen, C.C.; Ling, P.S.; -tuz-Zahra, F. Security and Privacy Issues in Wireless Networks and Mitigation Methods. Preprints 2020, 2020090110 (doi: 10.20944/preprints202009.0110.v1).

Abstract

The rapid growth of network services, Internet of Things devices and online users on the Internet have led to an increase in the amount of data transmitted daily. As more and more information is stored and transmitted on the Internet, cybercriminals are trying to gain access to the information to achieve their goals, whether it is to sell it on the dark web or for other malicious intent. Through thorough literature study relating to the causes and issues that are brought from the security and privacy segment of wireless networks, it is observed that there are various factors that can cause the networks to be an insecure; especially factors that revolve around cybercriminals with their growing expertise and the lack of preparation and efforts to combat them by relevant bodies. The aim of this paper is to showcase major and frequent security as well as privacy issues in wireless networks along with specialized solutions that can assist the related organizations or the public to fathom how great of an impact these challenges can bring if every related stakeholder took a step in reducing them. Through this paper it is discovered that there are many ways these challenges can be mitigated, however, the lack of implementation of privacy and security solutions is still largely present due to the absence of practical application of these solutions by responsible parties in real world scenarios.

Subject Areas

wireless networks; security attacks; privacy issues; mitigation methods

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our diversity statement.

Leave a public comment
Send a private comment to the author(s)
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.